General

  • Target

    2024-04-18_0042bedc439e058123a31baedf21c614_cryptolocker

  • Size

    38KB

  • MD5

    0042bedc439e058123a31baedf21c614

  • SHA1

    0133c796aed019528a3c503088f2647d7f5e34c3

  • SHA256

    0069bf4cfb751084f4028732478d6973740991e08f7de9507aaeb449e2c52fe6

  • SHA512

    7a9fe3bc96a0591d316fa92f2f7890b96faa53fd75e07a041587c1c46c68a7acea87527775678cf3879f58818c320efcda917d846d6e45296157b9ebec30a881

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaav:qDdFJy3QMOtEvwDpjjWMl7Td4

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_0042bedc439e058123a31baedf21c614_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections